Breach search
Hunt across the world’s largest combined breach corpus by email, username, password, IP or hash. Results return as flattened records with the source breach metadata.
Where
In-app: /app/breach.
Supported query types
- Email —
name@example.com - Username —
handle(no spaces) - Password — exact match
- IPv4 —
1.2.3.4 - Hash — MD5 / SHA-1 / SHA-256 / NTLM
SquareBreach auto-detects the type. Use the dropdown to force a specific interpretation.
What you get back
Each row includes:
- Email / username / password (where present in the source)
- Source breach name + leak date + total leak size
- Origin URL or paste id when available
- Linked devices from infostealer logs (if the email matches)
Filters
- Date range on breach disclosure date.
- Source — pin or exclude specific breaches.
- Has password — limit to records with credentials.
Tips
- Press
Son any result to save it to a folder. - Use
⌘ Jto expand all rows and copy them as JSON. - From an email row, click the breach name to see every other record in that breach.
Credit cost
- 1 credit per fresh search (24h cache).
- 0 credits when the same query is served from cache.
- 0 credits to expand or copy a row.